Arithmetic and Wavelet Based Information Security Using Image

Authors

  • Shiv Prasad  Department of CSE, Bengal College of Engineering & Technology, Durgapur, West Bengal, India
  • Prasenjit Maji  Department of CSE, Bengal College of Engineering & Technology, Durgapur, West Bengal, India

DOI:

https://doi.org//10.32628/CSEIT217513

Keywords:

Cryptography, Steganography, Information Security, IPR, PSNR, MSE

Abstract

The enhancement of information technology extensively changes the communication system in society. The information is rapidly shared through the internet or other electronic message delivery system without proper security measures. The IPR (Intellectual Property Right) of digital content or digital multimedia has to face the main challenge with the fear of distortion of the contents. Steganography and Cryptography are two widely used techniques for online digital contains authentication. Here we are using both of them together to make it more powerful with the help of simple Arithmetic and Binary operations and embed the same in the frequency domain using the wavelet function. Mainly target to provide a secure text information transmission with cryptex and stegano approach with high payload. The standard metric Peak Signal to Noise Ratio (PSNR) and MSE or Mean Squared Error measures the robustness of the proposed method.

References

  1. Sahu, Aditya Kumar, Swain, Gandharba and Babu, E. Suresh. "Digital Image Steganography Using Bit Flipping" Cybernetics and Information Technologies, vol.18, no.1, pp.69-80, 2018.
  2. Kuo, Wen-Chung and Wang, Chun-Cheng and Huang, Yu-Chih.,” Binary power data hiding scheme”. Int. J. Electron. Commun. Vol 69 issue 11, pp 1574–1582, 2015.
  3. K. Sathish Shet, A. R. Aswath, M. C. Hanumantharaju, and Xiao-Zhi Gao. “Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography”. Multimedia Tools Appl. Vol 78, issue 13, pp 18309–18338, July 2019.
  4. C. Chang, W. Tai, and K. Chen, "Improvements of EMD Embedding for Large Payloads," Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp. 473-476, 2007.
  5. Abbas Cheddad and Joan Condell and Kevin Curran and Paul {Mc Kevitt}, “ Digital image steganography: survey and analysis of current methods”. Signal Process, Vol 90, pp 727–752, 2010
  6. Pascal Maniriho, Tohari Ahmad,” Information hiding scheme for digital images using difference expansion and modulus function”.Journal of King Saud University - Computer and Information Sciences, Volume 31, Issue 3, Pages 335-347,2019,
  7. Anjali A. Shejul, Umesh L. Kulkarni, "A Secure Skin Tone based Steganography Using Wavelet Transform," International Journal of Computer Theory and Engineering vol. 3, no. 1, pp. 16-22, 2011.
  8. Saha, S., Ghosal, S., Chakraborty, A., Dasgupta, S., Sarkar, R., Mandal, J., “Improved exploiting modification direction-based steganography using dynamic weightage array”. Electron. Lett. Vol 54 issue 8, pp 498–500, 2018.
  9. Houda JOUHARI, “New Steganographic Schemes Using Binary and Quaternary Codes”, Le 1er Juillet, 2013.
  10. Mekha Jose, Kottayam Dst, “Hiding Image in Image Using LSB Insertion Method with improved Security and Quality”, International Journal of Science and Research , Volume 3 Issue 9,pp 2281 – 2284, September 2014.
  11. Padmini. K, Radhika .D. K.,” Least Significant Bit algorithm for image steganography “, International Journal of Advanced Computer Technology (IJACT), Volume 3, Number 4, 2014.
  12. Sneha Bansod, Gunjan Bhure, “Data Encryption by Image Steganography”, International Journal of Information and Computation Technology. Vol 4, Issue 5, pp. 453-458, 2014.
  13. Chi-Kwong Chan, L.M. Cheng, 2004. “Hiding data in images by simple LSB substitution”. Pattern Recogn.Vol 37, Issue 3, pp 469–474, 2004
  14. Anjali A. Shejul, Umesh L. Kulkarni, "A Secure Skin Tone based Steganography Using Wavelet Transform," International Journal of Computer Theory and Engineering vol. 3, no. 1, pp. 16-22, 2011.
  15. Xinpeng Zhang, Shuozhong Wang, “Efficient stenographic embedding by exploiting modification direction”. IEEE Commun. Lett. Vol 10, Issue 11, pp 781–783, 2006.
  16. C. Lee, Y. Wang, and C. Chang, "A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction," Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 497-500, 2007

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Shiv Prasad, Prasenjit Maji, " Arithmetic and Wavelet Based Information Security Using Image, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.428-434, May-June-2022. Available at doi : https://doi.org/10.32628/CSEIT217513